Search Results - (( rate detection path algorithm ) OR ( classification _ system algorithm ))

Refine Results
  1. 1

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5
  6. 6

    Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system by Chung, Gwo Chin, Mohd. Aqmal Syafiq Kamarudin, Lee, It Ee, Tan, Soo Fun

    Published 2021
    “…Hence, a higher probability of accuracy across the entire tested area can be achieved for the UWB positioning system by mitigating the NLOS path effect using the proposed algorithm. Besides that, the transmission of the line-of-sight (LOS) signal attains a data rate of around 15 times higher than the NLOS signal at a bit-error-rate (BER) of 10-5 in the indoor networking system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…This project focused on three main objectives: to investigate dengue data and Clonal Selection Algorithm for classification of Dengue, to design and develops Clonal Selection Classification System (CSCS) and to evaluate Clonal Selection Classification System symptoms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
    Get full text
    Get full text
    Article
  12. 12

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Named Data Networking (NDN) is an emerging Internet architecture that employs a pull-based, in-path caching, hop-by-hop, and multi-path transport architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…In order to improve classification performance problem, feature selection and discretization algorithm are crucial in selecting relevant attributes that could improve classification performance. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Phylogenetic tree classification system using machine learning algorithm by Tan, Jia Kae

    Published 2015
    “…A study is conducted to develop an automated phylogenetic tree image classification system by using machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    A Comparison Between Levenberg-Marquardt (LM) Intelligent System And Bayesian Regularization (BR) Intelligent System For Flow Regime Classification by Sa'ad, Mohamad Iqbal

    Published 2006
    “…The comparison made showed that LM learning algortihm is a faster training algorithm compared to BR training algorithm meanwhile BR learning algorithm capable of building a superior intelligent system in term of the overall system performance.…”
    Get full text
    Get full text
    Monograph
  18. 18

    Automatic email classification system / Phang Siew Ting by Phang , Siew Ting

    Published 2003
    “…Automatic Email Classification System is an email reader tool that implements machine learning algorithm in email classification, manipulated by a Graphical User Interface. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…In pattern recognition system, achieving high accuracy in pattern classification is crucial. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…FESSIC outperforms other algorithms for average classification accuracy for the KSVM, MLP, RF and DT classifiers. …”
    Get full text
    Get full text
    Get full text
    Thesis